Calendar No. 490 CYBERSECURITY ACT OF 2013 R E P O R T COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION S REPORT

Size: px
Start display at page:

Download "Calendar No. 490 CYBERSECURITY ACT OF 2013 R E P O R T COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION S. 1353 REPORT 113 270"

Transcription

1 1 Calendar No TH CONGRESS 2d Session " SENATE! REPORT CYBERSECURITY ACT OF 2013 R E P O R T OF THE COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION ON S NOVEMBER 12, Ordered to be printed emcdonald on DSK67QTVN1PROD with HEARING U.S. GOVERNMENT PRINTING OFFICE WASHINGTON : 2014 VerDate Sep :05 Nov 15, 2014 Jkt PO Frm Fmt 4012 Sfmt 4012 E:\HR\OC\SR270.XXX SR270 congress.#13

2 SENATE COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION ONE HUNDRED THIRTEENTH CONGRESS SECOND SESSION JOHN D. ROCKEFELLER IV, West Virginia, Chairman BARBARA BOXER, California BILL NELSON, Florida MARIA CANTWELL, Washington MARK PRYOR, Arkansas CLAIRE MCCASKILL, Missouri AMY KLOBUCHAR, Minnesota MARK BEGICH, Alaska RICHARD BLUMENTHAL, Connecticut BRIAN SCHATZ, Hawaii ED MARKEY, Massachusetts CORY BOOKER, New Jersey JOHN WALSH, Montana JOHN THUNE, South Dakota ROGER F. WICKER, Mississippi ROY BLUNT, Missouri MARCO RUBIO, Florida KELLY AYOTTE, New Hampshire DEAN HELLER, Nevada DAN COATS, Indiana TIM SCOTT, South Carolina TED CRUZ, Texas DEB FISCHER, Nebraska RON JOHNSON, Wisconsin ELLEN DONESKI, Staff Director JOHN WILLIAMS, General Counsel DAVID SCHWIETERT, Republican Staff Director NICK ROSSI, Republican Deputy Staff Director REBECCA SEIDEL, Republican General Counsel emcdonald on DSK67QTVN1PROD with HEARING VerDate Sep :05 Nov 15, 2014 Jkt PO Frm Fmt 5904 Sfmt 5904 E:\HR\OC\SR270.XXX SR270 (II)

3 113TH CONGRESS Calendar No. 490 REPORT " SENATE! 2d Session CYBERSECURITY ACT OF 2013 NOVEMBER 12, Ordered to be printed emcdonald on DSK67QTVN1PROD with HEARING Mr. ROCKEFELLER, from the Committee on Commerce, Science, and Transportation, submitted the following R E P O R T [To accompany S. 135] The Committee on Commerce, Science, and Transportation, to which was referred the bill (S. 1353) to provide for an ongoing, voluntary public-private partnership to improve cybersecurity, and to strengthen cybersecurity research and development, workforce development and education, and public awareness and preparedness, and for other purposes, having considered the same, reports favorably thereon with an amendment (in the nature of a substitute) and recommends that the bill (as amended) do pass. PURPOSE OF THE BILL The purpose of S is to help secure the Nation from cyber threats by clarifying the statutory authority of the National Institute of Standards and Technology (NIST) to facilitate and support the development of a set of voluntary, industry-led standards and best practices to reduce cyber risks to critical infrastructure. The bill would also ensure that the Federal Government supports cutting-edge research, increases public awareness, and improves our workforce to better address cyber threats. BACKGROUND AND NEEDS I. THE NATURE AND SCOPE OF THE CYBER THREAT Over the past two decades, the growth of the Internet and our country s increasing use of interconnected networks have produced unprecedented economic growth and innovation. However, our ever-increasing reliance upon the Internet has also allowed new threats to develop. As individuals, businesses, and governments VerDate Sep :05 Nov 15, 2014 Jkt PO Frm Fmt 6659 Sfmt 6601 E:\HR\OC\SR270.XXX SR270

4 2 shift more of their activities and store more of their information online, they become vulnerable to attackers intent on conducting malicious surveillance, stealing information, or disrupting operations. These attackers range from amateur hackers, to criminals, to state sponsors. The type of attack could be untargeted malware, denial of service, or an advanced persistent threat. 1 Top government officials and cybersecurity experts have repeatedly warned about the seriousness of the threat cyber incidents pose to our economic and national security. In January 2012 testimony on worldwide threats before the Senate Select Intelligence Committee, Robert Mueller, then-director of the Federal Bureau of Investigation, said that cyber threats will surpass the threat of terrorism in the foreseeable future. 2 Former National Security Agency Director General Keith Alexander described the consequences of cyber espionage as the greatest transfer of wealth in history. 3 Former Director of the National Counterterrorism Center Michael Leiter has described cyber attacks against the United States as a Pearl Harbor of slow moving deadly gas rather than blowing things up. We are being robbed blind. 4 With respect to economic security, a July 2013 joint Center for Strategic and International Studies- McAfee report estimates as much as a $100 billion annual loss to the U.S. economy with as many as 508,000 U.S. jobs lost or displaced due to malicious cyber activity. 5 A growing cyber threat affects both the Federal Government and the U.S. economy. According to Department of Homeland Security (DHS) data, the number of cyber incidents reported by Federal agencies to the United States Computer Emergency Readiness Team increased 782 percent between 2006 and 2012, with 48,562 incidents reported in Symantec estimates that targeted cyber attacks focused on individuals or specific companies increased 42 percent in 2012 compared with the preceding 12 months. Within that increase, targeted attacks specifically aimed at small businesses increased from 18 percent in the same period. 7 Verizon analysis of 2012 data breaches shows that 95 percent of targeted state-affiliated espionage incidents rely on the relatively simple technique of phishing, and, once attackers have gained access, 66 percent of breaches go undiscovered for months or even years. 8 National and homeland security officials are especially concerned about cyber attacks targeted at the industrial control systems (ICS) 1 See e.g., Mandiant, APT1: Exposing One of China s Cyber Espionage Units, February 18, 2013, at 2 Testimony of Robert Mueller, Senate Select Intelligence Committee, Current and Projected National Security Threats to the United States, January 31, 2012, at pkg/chrg-112shrg74790/pdf/chrg-112shrg74790.pdf. 3 Josh Rogin, NSA Chief: Cybercrime constitutes the greatest transfer of wealth in history, Foreign Policy, July 9, 2012, at cybercrime_constitutes_the_greatest_transfer_of_wealth_in_history. 4 Erin Mershon, Deal Possible on Cybersecurity if Senate Can Pass Similar Bill, Rogers Says, Communications Daily, September 26, James Andrew Lewis and Stewart Baker, The Economic Impact of Cybercrime and Espionage, Center for Strategic and International Studies, McAfee, July 23, 2013, at files/publication/60396rpt_cybercrime-cost_0713_ph4_0.pdf. 6 U.S. Government Accountability Office, Cybersecurity: National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented, GAO , February 2013, at 7 Symantec, Internet Security Threat Report, 2013, at enterprise/other_resources/b-istr_main report_v18_2012_ en-us.pdf. 8 Verizon, 2013 Data Breach Investigations Report, 2013, at resources/reports/rp_data-breach-investigations-report-2013_en_xg.pdf. VerDate Sep :05 Nov 15, 2014 Jkt PO Frm Fmt 6659 Sfmt 6601 E:\HR\OC\SR270.XXX SR270

5 3 that operate and monitor large physical systems in the United States. The ICS managing some of our country s most critical infrastructure, including the electric grid, oil pipelines, transportation networks, and financial institutions, are now accessible via the Internet and, as a result, could potentially be manipulated or attacked by malicious actors using computers in other parts of the world. The vulnerabilities of our country s critical infrastructure create a potentially serious threat to the American public. 9 Ninety percent of this infrastructure is owned and operated by private entities. 10, 11 With access to an infrastructure operator s network, attackers could change control parameters to disable or destroy the infrastructure. U.S. infrastructure, as a system of systems, is potentially vulnerable to cascading damages, such as if an electricity blackout leads to disruptions in water treatment, emergency communications, and oil and gas production. In an op-ed published in the Wall Street Journal in 2012, President Obama described such a scenario: It doesn t take much to imagine the consequences of a successful cyber attack. In a future conflict, an adversary unable to match our military supremacy on the battlefield might seek to exploit our computer vulnerabilities here at home. Taking down vital banking systems could trigger a financial crisis. The lack of clean water or functioning hospitals could spark a public health emergency. And as we ve seen in past blackouts, the loss of electricity can bring businesses, cities and entire regions to a standstill. 12 News reports of cyber attacks on critical infrastructure, government systems, and businesses show that destructive attacks are not merely theoretical red-team scenarios. In Saudi Arabia, for example, 2012 media reports indicated that a cyber attack on Saudi Aramco, the world s largest exporter of oil, strategically erased data from 30,000 computers on the company s network. 13 More recently, the press has reported sustained attacks on U.S. financial services companies, 14 universities, 15 and energy companies 16 designed to 9 See e.g., Presidential Directive/NSC-63 (May 22, 1998) ( Because of our military strength, future enemies, whether nations, groups or individuals, may seek to harm us in non-traditional ways including attacks within the United States. Because our economy is increasingly reliant upon interdependent and cyber-supported infrastructures, non-traditional attacks on our infrastructure and information systems may be capable of significantly harming both our military power and our economy. ) 10 National Infrastructure Advisory Council, Critical Infrastructure Partnership Strategic Assessment, October 14, 2008, at niac_critical_infrastructure_protection_assessment_final_report.pdf, p Industrial Control Systems Cyber Emergency Response Team, Control System Internet Accessibility, ICS-ALERT , October 28, 2010, at Alert A. 12 Barack Obama, Taking the Cyberattack Threat Seriously, Wall Street Journal, July 19, Wael Mahdi, Saudi Arabia Says Aramco Cyberattack Came From Foreign States, Bloomberg, December 9, 2012, at 14 Joseph Menn, Cyber attacks against banks more severe than most realize, Reuters, May 18, 2013, at 15 Richard Pérez-Peña, Universities Face a Rising Barrage of Cyberattacks, The New York Times, July 16, 2013, at 16 David E. Sanger and Nicole Perlroth, Cyberattacks Against U.S. Corporations Are on the Rise, The New York Times, May 12, 2013, at cyberattacks-on-rise-against-us-corporations.html?pagewanted=all. VerDate Sep :05 Nov 15, 2014 Jkt PO Frm Fmt 6659 Sfmt 6601 E:\HR\OC\SR270.XXX SR270

6 4 take down websites, steal intellectual property, and destroy data or manipulate infrastructure, respectively. The press itself has also come under attack, including The New York Times, which was knocked offline for several hours in August 2013 by the so-called Syrian Electronic Army. 17 In response to the industry-wide and ever-changing cyber threat, title I of the Cybersecurity Act of 2013 would promote the development of a set of voluntary standards and best practices that critical infrastructure operators in the United States can adopt to improve the security of their systems and lower the risk of a cyber attack that causes serious damage to the United States. Title I would clarify the authority of NIST, the Federal Government s leading technical standards and measurement agency, to support an industryled effort to develop these voluntary standards and best practices, and ensure this process will be ongoing to provide flexibility to meet evolving threats. II. CYBERSECURITY RESEARCH AND DEVELOPMENT AND WORKFORCE NEEDS While warning about the vulnerabilities of our information networks to cyber attacks, policymakers have also expressed concerns that the United States is under-investing in cybersecurity research and not training a sufficient amount of workers capable of defending government agencies and private sector businesses from cyber attacks. In December 2011, the White House Office of Science and Technology Policy (OSTP) released Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program. The plan sought to strengthen the often piecemeal cybersecurity research and development conducted by Federal agencies under the auspices of the Networking and Information Technology Research and Development (NITRD) Program. Four strategic goals have been set to guide research and development progress: inducing change, developing scientific foundations, maximizing research impact, and accelerating transition to practice. 18 According to several reports, the Federal and private sector cybersecurity workforce is facing increasing demand and potential shortages. A 2013 study found that, over the past 5 years, demand for cybersecurity professionals grew 3.5 times faster than general information technology jobs and 12 times faster than for all other jobs. 19 A 2012 assessment by the National Initiative for Cybersecurity Education (NICE) in partnership with the Federal Chief Information Officers Council found that nearly 80 percent of Federal cybersecurity workers surveyed were over the age of 40, with the majority nearing retirement age. 20 In 2013, the news reported that 17 Lee Ferran, Who s The Syrian Group Allegedly Behind The New York Times Cyber Attack?, ABC News, August 28, 2013, at 18 Executive Office of the President, Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program, National Science and Technology Council, December 2011, at fed_cybersecurity_rd_strategic_plan_2011.pdf. 19 Burning Glass Technologies, Initial Findings on Cyber Security Jobs, February 2013, at 20 National Initiative for Cybersecurity Education, 2012 Information Technology Workforce Assessment for Cybersecurity, March 14, 2013, at /04/ITWAC-Summary-Report_ pdf. VerDate Sep :05 Nov 15, 2014 Jkt PO Frm Fmt 6659 Sfmt 6601 E:\HR\OC\SR270.XXX SR270

7 5 the Department of Defense has an intent to expand Cyber Command, 21 yet security clearance and citizenship requirements, let alone education requirements, will make hiring those additional employees challenging. The National Science Foundation s (NSF) Scholarship for Service Program, which serves as a Federal Government pipeline for cybersecurity talent, currently graduates and places an average of just 150 students per year in Federal agencies. 22 Cynthia Dion-Schwarz, former Deputy Assistant Director of the NSF s Computer & Information Science & Engineering Directorate, commented, The outlook is grim because we are not producing, from an education perspective, the people with the right skills sets to just have the entry-level skills needed in order to make progress in cybersecurity. 23 Titles II through IV of the Cybersecurity Act of 2013 seek to address these challenges. Title II would task OSTP with coordinating Federal agencies cybersecurity research and development and would support basic cybersecurity research at NSF, in collaboration with academia and industry. Title III of the bill would authorize cybersecurity education and workforce development initiatives, including competitions and challenges, the scholarship-for-service program, and a study examining the education, training, and certification needs of the cybersecurity workforce. Title IV of the bill would authorize and expand the work of the NIST-coordinated NICE. SUMMARY OF PROVISIONS The purpose of S is to help improve the security of the Nation from cyber threats by clarifying NIST s statutory authority to facilitate and support the development of a set of voluntary, industry-led standards and best practices to reduce cyber risks to critical infrastructure. The bill would also ensure that the Federal Government supports cutting-edge research, increases public awareness, and improves our workforce to better address cyber threats. Title I of the bill would update the existing statutory authority of NIST to ensure that the agency will, on an ongoing basis, facilitate and support the development of a voluntary, industry-led set of standards and best practices to reduce cyber risks to critical infrastructure. It also would ensure that the information shared in this process may not be used for regulatory purposes. The set of standards and best practices that would be developed through this process must be voluntary; be developed in close and continuous coordination with industry; not conflict with or duplicate existing regulatory requirements; emcdonald on DSK67QTVN1PROD with HEARING 21 Elisabeth Bumiller, Pentagon Expanding Cybersecurity Force to Protect Network Against Attacks, The New York Times, January 27, 2013, at See also, Cheryl Pellerin, Rogers: Cybercom Defending Networks, Nation, DoD News, Defense Media Activity, August 18, 2014, at 22 Briefing by Victor P. Piotrowski, Lead Program Director, NSF, to Senate Commerce, Science, and Transportation Staff, July 29, Amber Corrin, Desperately seeking cybersecurity pros, FCW, October 26, 2012, at fcw.com/articles/2012/10/26/cyber-workforce.aspx. VerDate Sep :05 Nov 15, 2014 Jkt PO Frm Fmt 6659 Sfmt 6601 E:\HR\OC\SR270.XXX SR270

8 6 incorporate voluntary consensus standards and industry best practices and align with voluntary international standards; and be technology neutral. This section also would call on the Comptroller General of the United States to assess the progress, voluntary nature, and adoption of the standards and best practices to reduce cyber risks to critical infrastructure. Because of its technical expertise and its well-earned reputation as an honest broker in the standards development process, NIST is particularly well positioned to coordinate the development of these cybersecurity standards and practices. NIST s role in the development of standards is not that of a regulator, but of a convener and facilitator. NIST brings together knowledgeable players from government and industry and supports their efforts to build consensus around common standards. Industries adopt NIST standards because the standards that emerge from the NIST process consistently have high technical quality and utility. There are many well-documented cases where NIST standards have improved the quality of goods and services produced by U.S. companies while lowering transaction costs and promoting innovation. 24 In addition to the important role it plays in developing standards in the United States, NIST also actively works to harmonize U.S.-based standards with international standards. 25 Title II of the bill would call for a Federal cybersecurity research and development plan to be developed by OSTP and the coordination of research and development activities at NSF, NIST, other Federal agencies, academia, and the private sector. The bill also would authorize coordinated research to address gaps in knowledge preventing the development of secure technologies. In addition, agencies participating in the NITRD Program would be tasked with supporting research on the science of cybersecurity. Title III of the bill would call for a National Academy of Sciences study of the current state of higher level cybersecurity education and professional certification; would enable support of innovative competitions and challenges under America COMPETES Act authority to identify, develop, and recruit talented professionals and to stimulate innovation in cybersecurity research and development; and would authorize an existing NSF-led cyber scholarship-forservice program. Title IV of the bill would call on NIST to continue to coordinate, in conjunction with other Federal agencies, a cybersecurity public awareness campaign, initiatives to support formal cybersecurity education, and an ongoing evaluation and forecast of the workforce needs of the Federal Government. Title IV also would require NIST to develop, implement, and transmit to Congress a strategic plan in support of this program. emcdonald on DSK67QTVN1PROD with HEARING 24 See e.g., Erik Puskar, Selected Impacts of Documentary Standards Supported by NIST, 2008 Edition, NISTIR 7548, January 2009; David Leach and John T. Scott, The Economic Impacts of Documentary Standards: A Case Study of the Flat Panel Display Measurement Standard (FPDM), CGR G , December Maureen A. Breitenberg, The ABCs of Standards Activities, NISTIR 7614, August VerDate Sep :05 Nov 15, 2014 Jkt PO Frm Fmt 6659 Sfmt 6601 E:\HR\OC\SR270.XXX SR270

9 7 LEGISLATIVE HISTORY Since Senator Rockefeller became Chairman in early 2009, the Commerce Committee has devoted significant attention to the cybersecurity challenges facing the country. Chairman Rockefeller convened a Committee hearing on March 19, 2009, entitled, Cybersecurity: Assessing Our Vulnerabilities and Developing an Effective Response. On April 1, 2009, Chairman Rockefeller and Senator Snowe introduced S. 773, the Cybersecurity Act of S. 773 would have authorized the President and certain Federal agencies to take steps to protect government information systems and critical infrastructure from cyber attacks. It also would have ordered NIST to develop cybersecurity standards within one year and promoted cybersecurity research, training, and awareness. After a second hearing, entitled Cybersecurity: Next Steps to Protect Our Critical Infrastructure, on February 23, 2010, the Committee favorably reported an amended version of S. 773 on March 24, 2010, by voice vote. Although S. 773 was never considered on the Senate floor, portions of the legislation were included in a bipartisan cybersecurity bill, S. 3414, that the Senate considered during the 112th Congress. In addition to legislation, in the 112th Congress, the Committee continued to actively gather information about the cybersecurity threats to our national and economic security. As part of this effort, on September 19, 2012, Chairman Rockefeller wrote letters to the chief executive officers of the 500 largest companies in the United States requesting information about the companies cybersecurity practices and their view of how the public and private sectors should be working together to best address cybersecurity risks. More than 300 companies responded to this letter. In a January 28, 2013, memorandum to Chairman Rockefeller summarizing the responses of these companies, Committee staff reported that the companies generally supported strengthening the public-private partnership to address our country s cybersecurity vulnerabilities, but were concerned about legislation that might result in an inflexible, one-size-fits-all set of practices that could potentially conflict with existing sector-specific Federal regulations or slow down companies responses to cyber attacks. 26 The Committee s cybersecurity work continued in the 113th Congress. After President Obama issued an Executive Order entitled, Improving Critical Infrastructure Cybersecurity, on February 12, 2013 (Exec. Order No ), the Committee held a joint hearing with the Committee on Homeland Security and Governmental Affairs on March 7, 2013, entitled, The Cybersecurity Partnership Between the Private Sector and Our Government: Protecting Our National and Economic Security. This hearing examined the development and implementation of the February 12 Executive Order and discussed ways government and industry can work together to protect critical infrastructure from cyber attacks. Chairman Rockefeller and Ranking Member Thune introduced S. 1353, the Cybersecurity Act of 2013, on July 24, 2013, and on July 25, 2013, the Committee held a hearing entitled, The Partnership 26 Memorandum from Democratic Staff to Chairman Rockefeller of the Senate Commerce, Science and Transportation Committee, January 28, 2013, at public/?a=files.serve&file_id=5a85f211-a5c c84-d3a6b88024f6. VerDate Sep :05 Nov 15, 2014 Jkt PO Frm Fmt 6659 Sfmt 6601 E:\HR\OC\SR270.XXX SR270

10 8 Between NIST and the Private Sector: Improving Cybersecurity. This hearing focused on the role NIST was playing in developing the Cybersecurity Framework, called for in the Executive Order, to reduce cyber risks to critical infrastructure. The hearing also examined the broader role NIST plays in developing information security standards and the clarifications of NIST s authority proposed in S On July 30, 2013, the Committee met in open Executive Session and, by voice vote, ordered the bill to be reported favorably with an amendment in the nature of a substitute. Several amendments one from Senator Klobuchar, one jointly from Senator Klobuchar and Senator Blunt, one from Senator Warner, one from Senator Heinrich, and one from Senator Schatz were agreed to as part of the substitute amendment. ESTIMATED COSTS In accordance with paragraph 11(a) of rule XXVI of the Standing Rules of the Senate and section 403 of the Congressional Budget Act of 1974, the Committee provides the following cost estimate, prepared by the Congressional Budget Office: S Cybersecurity Act of 2013 Summary: S would direct several agencies within the federal government to take certain actions to facilitate public-private cooperation on cybersecurity standards, improve research and development in cybersecurity technologies, and further education and public awareness on cybersecurity matters. Several of the bill s requirements pertain to existing or planned programs and initiatives, while others create new requirements or expand the scope of existing efforts. CBO estimates that implementing S would cost $56 million over the period, assuming appropriation of the necessary amounts. Pay-as-you-go procedures do not apply to this legislation because it would not affect direct spending or revenues. S contains no intergovernmental or private-sector mandates as defined in the Unfunded Mandates Reform Act (UMRA) and would impose no costs on state, local, or tribal governments. Estimated cost to the Federal Government: The estimated budgetary impact of S is shown in the following table. The costs of this legislation fall within budget functions 250 (general science, space, and technology) and 370 (commerce and housing credit). By fiscal year, in millions of dollars emcdonald on DSK67QTVN1PROD with HEARING CHANGES IN SPENDING SUBJECT TO APPROPRIATION Cybersecurity Standards and Public-Private Collaboration: Estimated Authorization Level... * 1 * * 1 2 Estimated Outlays... * 1 * * 1 2 Cybersecurity Research and Development: Estimated Authorization Level... * Estimated Outlays... * Cybersecurity Education, Training, and Public Awareness: Estimated Authorization Level Estimated Outlays Total Changes: Estimated Authorization Level VerDate Sep :05 Nov 15, 2014 Jkt PO Frm Fmt 6659 Sfmt 6602 E:\HR\OC\SR270.XXX SR270

11 9 By fiscal year, in millions of dollars emcdonald on DSK67QTVN1PROD with HEARING Estimated Outlays Note: Components may not sum to totals because of rounding. * = less than $500,000. Basis of estimate: For this estimate, CBO assumes that the bill will be enacted early in 2014, the necessary amounts will be appropriated each year, and spending will follow historical patterns for similar activities. Cybersecurity standards and public-private collaboration Title I would codify certain elements of Executive Order by directing the National Institute of Standards and Technology (NIST) to develop a framework of voluntary standards designed to reduce risks arising from cyberattacks on critical infrastructure that is privately owned and operated. The agency expects to spend about $6 million to develop the standards (the preliminary framework was completed in October 2013) and anticipates spending a similar amount annually to review and update the framework as required by the executive order. Based on information from the agency, CBO estimates that codifying the requirements of the executive order would not significantly increase the agency s costs. Title I also would require the Government Accountability Office (GAO) to assess progress made by NIST in developing the framework and the private sector in adopting the standards; GAO also would be required to prepare a summary of its findings and report to the Congress every two years. CBO estimates that implementing this provision would cost $2 million over the period, assuming the availability of appropriated funds. Cybersecurity research and development Title II would require the Director of the National Science Foundation (NSF) to review existing infrastructure used to test cybersecurity technologies within one year of the bill s enactment. Based on the results of the review, the NSF would be authorized to award grants to establish additional infrastructure to test cybersecurity technologies. Based on information provided by the agency, CBO estimates that implementing this provision would cost $33 million over the period, assuming the appropriation of the necessary amounts. Title II also would require the Director of the Office of Science and Technology Policy (OSTP) to develop a federal cybersecurity research and development plan in consultation with nonfederal entities. Under the legislation, the director would be required to update the plan and report to the Congress every three years. Based on information provided by OSTP, CBO estimates that implementing this provision would cost about $2 million over the next five years. Cybersecurity education, training, and public awareness Title III would require the Director of the NSF to contract with the National Academy of Sciences (NAS) to conduct a study of education, training, and certification programs for the development of professionals in the areas of information infrastructure and cybersecurity. Based on information from the NAS, CBO estimates that VerDate Sep :05 Nov 15, 2014 Jkt PO Frm Fmt 6659 Sfmt 6602 E:\HR\OC\SR270.XXX SR270

12 10 implementing this provision of title III would cost $1 million over the period, assuming appropriation of the necessary amounts. Other provisions of title III would require the Director of the NSF to continue a scholarship-for-service program to train professionals to meet the cybersecurity needs of federal, state, local, and tribal governments. This title also would require several agencies, including the Department of Commerce, NSF, and the Department of Homeland Security, to support competitions to identify and recruit individuals to enhance innovation in basic and applied cybersecurity that can be used to advance the mission of the agency. Based on information from those agencies, CBO estimates that implementing those provisions would not significantly increase discretionary spending over the period because those activities are already occurring under current law. Title IV would require NIST to continue to coordinate a national campaign to increase public awareness of cybersecurity threats. The agency also would be required to develop and implement a strategic plan to guide federal agencies support of the campaign. Based on information from NIST, CBO expects that implementing those requirements would cost $18 million over the period, assuming appropriation of the necessary amounts, for personnel and administrative costs. Pay-As-You-Go Considerations: None. Intergovernmental and private-sector impact: S contains no intergovernmental or private-sector mandates as defined in UMRA and would impose no costs on state, local, or tribal governments. Estimate prepared by: Federal costs: Susan Willie and Martin von Gnechten; Impact on state, local, and tribal governments: J nell L. Blanco; Impact on the private sector: Marin Burnett. Estimate approved by: Theresa Gullo, Deputy Assistant Director for Budget Analysis. REGULATORY IMPACT STATEMENT In accordance with paragraph 11(b) of rule XXVI of the Standing Rules of the Senate, the Committee provides the following evaluation of the regulatory impact of the legislation, as reported: NUMBER OF PERSONS COVERED The bill would require NIST to, on an ongoing basis, facilitate and support the development of a voluntary, industry-led set of standards, guidelines, best practices, methodologies, procedures, and processes to reduce cyber risks to critical infrastructure. The bill would also authorize existing research and development activities, support cybersecurity workforce training and education, and support efforts to raise public awareness of the cyber threat. The bill would not subject any individuals or businesses affected by the bill to any additional regulations, as the product of NIST s and industry s work is voluntary. ECONOMIC IMPACT The bill would not authorize new funding. It is anticipated that research conducted under the authority of title II and section 301 of the bill may lead to new technologies and solutions to evolving VerDate Sep :05 Nov 15, 2014 Jkt PO Frm Fmt 6659 Sfmt 6602 E:\HR\OC\SR270.XXX SR270

13 11 cyber threats. Section 302 would have a positive impact on the availability of qualified cybersecurity professionals to the Federal Government. Section 401 could also have a positive impact over time by reducing the number of individual victims of malicious cyber activities and associated costs. PRIVACY The bill would not have any adverse impact on the personal privacy of individuals. PAPERWORK The bill would not increase paperwork requirements for private individuals or businesses. The bill would require three reports from the Federal Government and one study to be carried out by the National Academy of Sciences on behalf of the Federal Government. The first report would be from the Comptroller General of the United States assessing the progress, voluntary nature, and adoption of the standards and best practices to reduce cyber risks to critical infrastructure. This report would be delivered to the Committee on Commerce, Science, and Transportation of the Senate, the Committee on Energy and Commerce of the House of Representatives, and the Committee on Science, Space, and Technology of the House of Representatives one year after enactment and every two years thereafter for six years. The second report would be a Federal cybersecurity research and development plan from the Director of OSTP. This plan would be delivered to the Committee on Commerce, Science, and Transportation of the Senate and the Committee on Science, Space, and Technology of the House of Representatives within one year of enactment and every three years thereafter. The third report would be a strategic plan for the national cybersecurity awareness and preparedness campaign from the Director of NIST. This plan would be delivered to the Committee on Commerce, Science, and Transportation of the Senate and the Committee on Science, Space, and Technology of the House of Representatives within one year of enactment and every five years thereafter. The National Academy of Sciences study, supported by the Director of NSF, the Director of the Office of Personnel Management (OPM), and the Secretary of Homeland Security, would be a comprehensive study of government, academic, and private-sector education, accreditation, training, and certification programs for the development of professionals in information infrastructure and cybersecurity. This study would be due to the President and Congress within one year of enactment, though it is possible more time may be required for the final draft. The bill also would require the Director of NSF, in coordination with the Director of OSTP, to conduct a review of cybersecurity test beds in existence on the date of enactment. This review would trigger the awarding of additional grants for test beds if needed to support the research and testing needs of the Federal cybersecurity research and development plan. The Committee envisions further assessments of effectiveness of these grants to be included in annual budget justifications after the initial two years given to allow any new test beds to begin operation. VerDate Sep :05 Nov 15, 2014 Jkt PO Frm Fmt 6659 Sfmt 6602 E:\HR\OC\SR270.XXX SR270

14 12 CONGRESSIONALLY DIRECTED SPENDING In compliance with paragraph 4(b) of rule XLIV of the Standing Rules of the Senate, the Committee provides that no provisions contained in the bill, as reported, meet the definition of congressionally directed spending items under the rule. SECTION-BY-SECTION ANALYSIS Section 1. Short title; table of contents. This section would provide that the legislation may be cited as the Cybersecurity Act of This section would also provide the table of contents for the legislation. Section 2. Definitions. This section would define three key terms. Section 3. No regulatory authority. This section would clarify that no regulatory authority is conferred on any Federal, State, tribal, or local department or agency by the bill. TITLE I PUBLIC-PRIVATE COLLABORATION ON CYBERSECURITY Sec Public-private collaboration on cybersecurity. This section would update the existing statutory authority of NIST to ensure that NIST would, consistent with existing authority, on an ongoing basis, facilitate and support the development of a voluntary, non-regulatory, industry-led set of standards and best practices to reduce cyber risks to critical infrastructure. The set of standards and best practices that would be developed through this process: must be voluntary; must be developed in close and continuous coordination with industry; must not conflict with or duplicate existing regulatory requirements; must incorporate voluntary consensus standards and industry best practices and align with voluntary international standards; and must be technology neutral. The Committee recognizes that several industries are subject to regulatory requirements, standards, and processes pertaining to security: therefore, this process must not duplicate regulatory processes and not conflict with or supercede requirements, mandatory standards, and related process. This limitation, however is not intended to prevent NIST from recognizing existing standards or best practices, or to impose an obligation upon NIST to resolve possible inconsistencies among existing standards and best practices that may be utilized by different entities. The aim of this legislation is not to create a single, one-size-fits-all standard or set of standards; rather, it is to identify on an ongoing basis industry-led standards and best practices that may mitigate dynamic cyber threats and vulnerabilities. Further, information shared with NIST in this process or for purposes of this process may not be used to regulate the activity of any entity. This section would also require a study and report from the Comptroller General assessing the progress made by NIST in facilitating the standards and best practices to reduce cyber risks to critical infrastructure, the extent to which such standards are voluntary and their development led by industry representatives, and VerDate Sep :05 Nov 15, 2014 Jkt PO Frm Fmt 6659 Sfmt 6602 E:\HR\OC\SR270.XXX SR270

15 13 the extent to which critical infrastructure sectors have adopted the voluntary standards and best practices, among other considerations. The report would be due to the relevant congressional committees one year after enactment and every two years thereafter for six years. TITLE II CYBERSECURITY RESEARCH AND DEVELOPMENT Sec Federal cybersecurity research and development. This section would call on the Director of OSTP, in coordination with relevant Federal agencies, to develop a Federal cybersecurity research and development plan to identify and prioritize research needed to meet several key objectives, while recognizing that the Director of OSTP has flexibility in determining additional objectives. The Director of OSTP may coordinate with relevant stakeholders, including industry, academia, and appropriate national laboratories to determine additional objectives. This section would ensure Federal research as part of this plan is not duplicative of private sector efforts. The plan would be updated triennially. This section would also require the Director of NSF to support research to inform computer science programs and professional development, and would add several research areas to NSF s authority to address gaps in knowledge preventing the development of secure technologies. This section would also call on the Director of NSF to evaluate the need for additional cybersecurity test beds and would authorize the Director of NSF, the Secretary of Commerce, and the Secretary of Homeland Security to support further development of test beds if necessary to meet the needs of the national cybersecurity research and development plan. This section would also require the Director of OSTP to coordinate cybersecurity research and development activities across the Federal Government. Agencies would also support research on the science of cybersecurity. Sec Computer and network security research centers. This section would amend existing NSF authority to establish computer and network security research centers, especially criteria related to selection of new centers which would conduct research specific to improving security and resiliency of information infrastructure, reducing cyber vulnerabilities, and anticipating and mitigating consequences of cyber attacks on critical infrastructure. New criteria would also include the ability of research centers to transition new technologies into the private sector or Federal Government, among others. Research areas that centers may pursue would be enhanced in section 201 of the bill. TITLE III EDUCATION AND WORKFORCE DEVELOPMENT Sec Cybersecurity competitions and challenges. This section would call on the Secretary of Commerce, Director of NSF, and Secretary of Homeland Security, in consultation with the Director of OPM, to support competitions and challenges to identify, develop, and recruit talented individuals who could secure government and private sector information infrastructure, as well as to stimulate innovation in basic and applied cybersecurity research. This authority would be derived from section 105 of the America COMPETES Reauthorization Act of 2010 (P.L ; VerDate Sep :05 Nov 15, 2014 Jkt PO Frm Fmt 6659 Sfmt 6602 E:\HR\OC\SR270.XXX SR270

16 Stat. 3989), which adds section 24 of the Stevenson-Wydler Technology Innovation Act of 1980 (15 U.S.C. 3719). The participating agencies would seek the participation of high school, university, and graduate students, veterans, and other relevant organizations and individuals. This section would call on competitions and challenges to focus on certain skill gaps and would encourage cooperation with existing regional, State, school, and private sector initiatives. Sec Federal cyber scholarship-for-service program. This section would authorize an existing NSF initiative, in coordination with the Director of OPM and Secretary of Homeland Security, to recruit, educate, and develop the next generation of Federal cybersecurity professionals. NSF would support scholarships for students enrolled at institutions of higher education studying for degrees or specialized program certifications in the cybersecurity field, under which a recipient would work in the cybersecurity mission of a Federal, State, local, or tribal agency for a period equal to the length of the scholarship following receipt of the student s degree. This section would define agency hiring authority and eligibility for the scholarship, and provide for repayment of the scholarship should a recipient fail to meet the terms of the program as established by the Director of NSF. NSF would evaluate and report periodically to Congress on the success of recruiting and retaining scholarship recipients in the public sector workforce. The Committee believes additional incentives within existing authority, such as loan repayment programs, should be considered by Federal agencies to attract and retain a talented workforce. The Committee will continue to examine the effectiveness of such incentives. Sec Study and analysis of education, accreditation, training, and certification of information infrastructure and cybersecurity professionals. This section would call on the Director of NSF, the Director of OPM, and the Secretary of Homeland Security to jointly contract with the National Academy of Sciences for a comprehensive study of government, academic, and private-sector education, accreditation, training, and certification programs for the development of professionals in information infrastructure and cybersecurity. The study would include an evaluation of the knowledge needed for professionals to secure information systems; an assessment of whether existing education, accreditation, training, and certification programs provide the necessary body of knowledge; an evaluation of the state of cybersecurity education at U.S. institutions of higher education; an analysis of barriers to the Federal Government in recruiting and hiring cybersecurity talent; and an analysis of the capacity of U.S. institutions of higher education to provide current and future cybersecurity professionals to meet the needs of the Federal Government, State and local entities, and private sector. The study would be due to the President and Congress within one year of enactment. The Committee recognizes that the National Academy of Sciences released a report in September 2013 entitled Professionalizing the Nation s Cybersecurity Workforce and believes that the study in this section should not duplicate existing or prior work in this area. VerDate Sep :05 Nov 15, 2014 Jkt PO Frm Fmt 6659 Sfmt 6602 E:\HR\OC\SR270.XXX SR270

17 15 TITLE IV CYBERSECURITY AWARENESS AND PREPAREDNESS Sec National cybersecurity awareness and preparedness campaign. This section would call on the Director of NIST, in consultation with relevant Federal agencies, to continue coordination of a national cybersecurity awareness and preparedness campaign. This initiative would include a public awareness media campaign; a campaign to increase the understanding of State and local government and institutions of higher education of effective risk management; support for formal cybersecurity education programs; and initiatives to evaluate and forecast future cybersecurity workforce needs of the Federal Government, among others. This section would call for a strategic plan to guide the awareness and preparedness campaign. CHANGES IN EXISTING LAW In compliance with paragraph 12 of rule XXVI of the Standing Rules of the Senate, changes in existing law made by the bill, as reported, are shown as follows (existing law proposed to be omitted is enclosed in black brackets, new material is printed in italic, existing law in which no change is proposed is shown in roman): emcdonald on DSK67QTVN1PROD with HEARING NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY ACT [15 U.S.C. 271 et seq.] SEC. 2. ESTABLISHMENT, FUNCTIONS, AND ACTIVITIES. [15 U.S.C. 272] * * * * * * * (c) IMPLEMENTATION ACTIVITIES. In carrying out the functions specified in subsection (b), the Secretary, acting through the Director may, among other things (1) construct physical standards; (2) test, calibrate, and certify standards and standard measuring apparatus; (3) study and improve instruments, measurement methods, and industrial process control and quality assurance techniques; (4) cooperate with the States in securing uniformity in weights and measures laws and methods of inspection; (5) cooperate with foreign scientific and technical institutions to understand technological developments in other countries better; (6) prepare, certify, and sell standard reference materials for use in ensuring the accuracy of chemical analyses and measurements of physical and other properties of materials; (7) in furtherance of the purposes of this Act, accept research associates, cash donations, and donated equipment from industry, and also engage with industry in research to develop new basic and generic technologies for traditional and new products and for improved production and manufacturing; VerDate Sep :05 Nov 15, 2014 Jkt PO Frm Fmt 6659 Sfmt 6601 E:\HR\OC\SR270.XXX SR270

18 16 (8) study and develop fundamental scientific understanding and improved measurement, analysis, synthesis, processing, and fabrication methods for chemical substances and compounds, ferrous and nonferrous metals, and all traditional and advanced materials, including processes of degradation; (9) investigate ionizing and nonionizing radiation and radioactive substances, their uses, and ways to protect people structures, and equipment from their harmful effects; (10) determine the atomic and molecular structure of matter, through analysis of spectra and other methods, to provide a basis for predicting chemical and physical structures and reactions and for designing new materials and chemical substances, including biologically active macromolecules; (11) perform research on electromagnetic waves, including optical waves, and on properties and performance of electrical, electronic, and electromagnetic devices and systems and their essential materials, develop and maintain related standards, and disseminate standard signals through broadcast and other means; (12) develop and test standard interfaces, communication protocols, and data structures for computer and related telecommunications systems; (13) study computer systems (as that term is defined in section 20(d) of this Act) and their use to control machinery and processes; (14) perform research to develop standards and test methods to advance the effective use of computers and related systems and to protect the information stored, processed, and transmitted by such systems and to provide advice in support of policies affecting Federal computer and related telecommunications systems; (15) on an ongoing basis, facilitate and support the development of a voluntary, industry-led set of standards, guidelines, best practices, methodologies, procedures, and processes to reduce cyber risks to critical infrastructure (as defined under subsection (e)); ø(15) (16) determine properties of building materials and structural elements, and encourage their standardization and most effective use, including investigation of fire-resisting properties of building materials and conditions under which they may be most efficiently used, and the standardization of types of appliances for fire prevention; ø(16) (17) undertake such research in engineering, pure and applied mathematics, statistics, computer science, materials science, and the physical sciences as may be necessary to carry out and support the functions specified in this section; ø(17) (18) compile, evaluate, publish, and otherwise disseminate general, specific and technical data resulting from the performance of the functions specified in this section or from other sources when such data are important to science, engineering, or industry, or to the general public, and are not available elsewhere; ø(18) (19) collect, create, analyze, and maintain specimens of scientific value; ø(19) (20) operate national user facilities; VerDate Sep :05 Nov 15, 2014 Jkt PO Frm Fmt 6659 Sfmt 6601 E:\HR\OC\SR270.XXX SR270

19 17 ø(20) (21) evaluate promising inventions and other novel technical concepts submitted by inventors and small companies and work with other Federal agencies, States, and localities to provide appropriate technical assistance and support for those inventions which are found in the evaluation process to have commercial promise; ø(21) (22) demonstrate the results of the Institute s activities by exhibits or other methods of technology transfer, including the use of scientific or technical personnel of the Institute for part-time or intermittent teaching and training activities at educational institutions of higher learning as part of and incidental to their official duties; and ø(22) (23) undertake such other activities similar to those specified in this subsection as the Director determines appropriate. (d) MANAGEMENT COSTS. In carrying out the extramural funding programs of the Institute, including the programs established under sections 25, 26, and 28 of this Act, the Secretary may retain reasonable amounts of any funds appropriated pursuant to authorizations for these programs in order to pay for the Institute s management of these programs. (e) CYBER RISKS. (1) IN GENERAL. In carrying out the activities under subsection (c)(15), the Director (A) shall (i) coordinate closely and continuously with relevant private sector personnel and entities, critical infrastructure owners and operators, sector coordinating councils, Information Sharing and Analysis Centers, and other relevant industry organizations, and incorporate industry expertise; (ii) consult with the heads of agencies with national security responsibilities, sector-specific agencies, State and local governments, the governments of other nations, and international organizations; (iii) identify a prioritized, flexible, repeatable, performance-based, and cost-effective approach, including information security measures and controls, that may be voluntarily adopted by owners and operators of critical infrastructure to help them identify, assess, and manage cyber risks; (iv) include methodologies (I) to identify and mitigate impacts of the cybersecurity measures or controls on business confidentiality; and (II) to protect individual privacy and civil liberties; (v) incorporate voluntary consensus standards and industry best practices; (vi) align with voluntary international standards to the fullest extent possible; (vii) prevent duplication of regulatory processes and prevent conflict with or superseding of regulatory requirements, mandatory standards, and related processes; and VerDate Sep :05 Nov 15, 2014 Jkt PO Frm Fmt 6659 Sfmt 6603 E:\HR\OC\SR270.XXX SR270

20 18 (viii) include such other similar and consistent elements as the Director considers necessary; and (B) shall not prescribe or otherwise require (i) the use of specific solutions; (ii) the use of specific information or communications technology products or services; or (iii) that information or communications technology products or services be designed, developed, or manufactured in a particular manner. (2) LIMITATION. Information shared with or provided to the Institute for the purpose of the activities described under subsection (c)(15) shall not be used by any Federal, State, tribal, or local department or agency to regulate the activity of any entity. (3) DEFINITIONS. In this subsection: (A) CRITICAL INFRASTRUCTURE. The term critical infrastructure has the meaning given the term in section 1016(e) of the USA PATRIOT Act of 2001 (42 U.S.C. 5195c(e)). (B) SECTOR-SPECIFIC AGENCY. The term sector-specific agency means the Federal department or agency responsible for providing institutional knowledge and specialized expertise as well as leading, facilitating, or supporting the security and resilience programs and associated activities of its designated critical infrastructure sector in the all-hazards environment. CYBER SECURITY RESEARCH AND DEVELOPMENT ACT [15 U.S.C et seq.) SEC. 4. NATIONAL SCIENCE FOUNDATION RESEARCH. [15 U.S.C. 7403] (a) COMPUTER AND NETWORK SECURITY RESEARCH GRANTS. (1) IN GENERAL. The Director shall award grants for basic research on innovative approaches to the structure of computer and network hardware and software that are aimed at enhancing computer security. Research areas may include (A) authentication, cryptography, and other secure data communications technology; (B) computer forensics and intrusion detection; (C) reliability of computer and network applications, middleware, operating systems, control systems, and communications infrastructure; (D) privacy and confidentiality; (E) network security architecture, including tools for security administration and analysis; (F) emerging threats; (G) vulnerability assessments and techniques for quantifying risk; (H) remote access and wireless security; øand (I) enhancement of law enforcement ability to detect, investigate, and prosecute cyber-crimes, including those that involve piracy of intellectual propertyø. ; (J) secure fundamental protocols that are integral to inter-network communications and data exchange; VerDate Sep :05 Nov 15, 2014 Jkt PO Frm Fmt 6659 Sfmt 6603 E:\HR\OC\SR270.XXX SR270

Calendar No. 195 STEM EDUCATION ACT OF 2015 R E P O R T COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION H. R. 1020 REPORT 114 115

Calendar No. 195 STEM EDUCATION ACT OF 2015 R E P O R T COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION H. R. 1020 REPORT 114 115 1 Calendar No. 195 114TH CONGRESS 1st Session " SENATE! REPORT 114 115 STEM EDUCATION ACT OF 2015 R E P O R T OF THE COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION ON H. R. 1020 smartinez on DSK4TPTVN1PROD

More information

1st Session Part 1 HOMELAND SECURITY UNIVERSITY-BASED CENTERS REVIEW ACT

1st Session Part 1 HOMELAND SECURITY UNIVERSITY-BASED CENTERS REVIEW ACT 114TH CONGRESS REPT. 114 168 " HOUSE OF REPRESENTATIVES! 1st Session Part 1 HOMELAND SECURITY UNIVERSITY-BASED CENTERS REVIEW ACT JUNE 18, 2015. Committed to the Committee of the Whole House on the State

More information

" SENATE NATIONAL CYBERSECURITY AND COMMUNICATIONS INTEGRATION CENTER ACT OF 2014 R E P O R T OF THE

 SENATE NATIONAL CYBERSECURITY AND COMMUNICATIONS INTEGRATION CENTER ACT OF 2014 R E P O R T OF THE 1 Calendar No. 526 113TH CONGRESS 2d Session " SENATE! REPORT 113 240 NATIONAL CYBERSECURITY AND COMMUNICATIONS INTEGRATION CENTER ACT OF 2014 R E P O R T OF THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL

More information

The Pros and Cons of Small Business Loan Debt

The Pros and Cons of Small Business Loan Debt 113TH CONGRESS Calendar No. 169 REPORT " SENATE! 1st Session 113 91 THE COMMUNICATING LENDER ACTIVITY REPORTS FROM THE SMALL BUSINESS ADMINISTRATION (CLEAR SBA) ACT OF 2013 SEPTEMBER 10, 2013. Ordered

More information

1st Session 113 29 AMERICAN BATTLEFIELD PROTECTION PROGRAM AMENDMENTS ACT OF 2013

1st Session 113 29 AMERICAN BATTLEFIELD PROTECTION PROGRAM AMENDMENTS ACT OF 2013 113TH CONGRESS REPORT " HOUSE OF REPRESENTATIVES! 1st Session 113 29 AMERICAN BATTLEFIELD PROTECTION PROGRAM AMENDMENTS ACT OF 2013 APRIL 9, 2013. Committed to the Committee of the Whole House on the State

More information

No. 33 February 19, 2013. The President

No. 33 February 19, 2013. The President Vol. 78 Tuesday, No. 33 February 19, 2013 Part III The President Executive Order 13636 Improving Critical Infrastructure Cybersecurity VerDate Mar2010 17:57 Feb 15, 2013 Jkt 229001 PO 00000 Frm 00001

More information

How To Pass A Bill To Make A Bone Marrow Donation Register

How To Pass A Bill To Make A Bone Marrow Donation Register 108TH CONGRESS REPORT " HOUSE OF REPRESENTATIVES! 1st Session 108 276 NATIONAL BONE MARROW DONOR REGISTRY REAUTHORIZATION ACT SEPTEMBER 17, 2003. Committed to the Committee of the Whole House on the State

More information

1st Session 114 72 CONTRACTING AND TAX ACCOUNTABILITY ACT OF 2015

1st Session 114 72 CONTRACTING AND TAX ACCOUNTABILITY ACT OF 2015 114TH CONGRESS REPORT " HOUSE OF REPRESENTATIVES! 1st Session 114 72 CONTRACTING AND TAX ACCOUNTABILITY ACT OF 2015 APRIL 14, 2015. Committed to the Committee of the Whole House on the State of the Union

More information

1st Session 114 162 DHS IT DUPLICATION REDUCTION ACT OF 2015

1st Session 114 162 DHS IT DUPLICATION REDUCTION ACT OF 2015 114TH CONGRESS REPORT " HOUSE OF REPRESENTATIVES! 1st Session 114 162 DHS IT DUPLICATION REDUCTION ACT OF 2015 JUNE 17, 2015. Committed to the Committee of the Whole House on the State of the Union and

More information

1st Session Part 1 HOMELAND SECURITY DRONE ASSESSMENT AND ANALYSIS ACT

1st Session Part 1 HOMELAND SECURITY DRONE ASSESSMENT AND ANALYSIS ACT 114TH CONGRESS REPT. 114 169 " HOUSE OF REPRESENTATIVES! 1st Session Part 1 HOMELAND SECURITY DRONE ASSESSMENT AND ANALYSIS ACT JUNE 18, 2015. Committed to the Committee of the Whole House on the State

More information

[STAFF WORKING DRAFT]

[STAFF WORKING DRAFT] S:\LEGCNSL\LEXA\DOR\OI\PARTIAL\CyberWD..xml [STAFF WORKING DRAFT] JULY, 0 SECTION. TABLE OF CONTENTS. The table of contents of this Act is as follows: Sec.. Table of contents. Sec.. Definitions. TITLE

More information

1st Session 114 242 STEM CELL THERAPEUTIC AND RESEARCH REAUTHORIZATION ACT OF 2015

1st Session 114 242 STEM CELL THERAPEUTIC AND RESEARCH REAUTHORIZATION ACT OF 2015 114TH CONGRESS REPORT " HOUSE OF REPRESENTATIVES! 1st Session 114 242 STEM CELL THERAPEUTIC AND RESEARCH REAUTHORIZATION ACT OF 2015 SEPTEMBER 8, 2015. Committed to the Committee of the Whole House on

More information

" SENATE QUARTERLY FINANCIAL REPORTING REAUTHORIZATION ACT OF 2015 R E P O R T OF THE

 SENATE QUARTERLY FINANCIAL REPORTING REAUTHORIZATION ACT OF 2015 R E P O R T OF THE 1 Calendar No. 277 114TH CONGRESS 1st Session " SENATE! REPORT 114 157 QUARTERLY FINANCIAL REPORTING REAUTHORIZATION ACT OF 2015 R E P O R T OF THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS

More information

" SENATE PROVIDING FOR CONTINUED HEALTH BENE- FITS COVERAGE FOR CERTAIN FEDERAL EMPLOYEES, AND FOR OTHER PURPOSES R E P O R T OF THE

 SENATE PROVIDING FOR CONTINUED HEALTH BENE- FITS COVERAGE FOR CERTAIN FEDERAL EMPLOYEES, AND FOR OTHER PURPOSES R E P O R T OF THE 1 Calendar No. 801 108TH CONGRESS 2d Session " SENATE! REPORT 108 410 PROVIDING FOR CONTINUED HEALTH BENE- FITS COVERAGE FOR CERTAIN FEDERAL EMPLOYEES, AND FOR OTHER PURPOSES R E P O R T OF THE COMMITTEE

More information

NATIONAL CYBERSECURITY PROTECTION ACT OF 2014

NATIONAL CYBERSECURITY PROTECTION ACT OF 2014 PUBLIC LAW 113 282 DEC. 18, 2014 NATIONAL CYBERSECURITY PROTECTION ACT OF 2014 VerDate Mar 15 2010 21:01 Feb 12, 2015 Jkt 049139 PO 00282 Frm 00001 Fmt 6579 Sfmt 6579 E:\PUBLAW\PUBL282.113 PUBL282 128

More information

" SENATE THE FEDERAL DATA CENTER CONSOLIDATION ACT OF 2013 R E P O R T OF THE

 SENATE THE FEDERAL DATA CENTER CONSOLIDATION ACT OF 2013 R E P O R T OF THE 1 Calendar No. 372 113TH CONGRESS 2d Session " SENATE! REPORT 113 157 THE FEDERAL DATA CENTER CONSOLIDATION ACT OF 2013 R E P O R T OF THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED

More information

2d Session 114 566 DEPARTMENT OF HOMELAND SECURITY STRATEGY FOR INTERNATIONAL PROGRAMS ACT

2d Session 114 566 DEPARTMENT OF HOMELAND SECURITY STRATEGY FOR INTERNATIONAL PROGRAMS ACT 114TH CONGRESS REPORT " HOUSE OF REPRESENTATIVES! 2d Session 114 566 DEPARTMENT OF HOMELAND SECURITY STRATEGY FOR INTERNATIONAL PROGRAMS ACT MAY 13, 2016. Committed to the Committee of the Whole House

More information

1st Session 109 38 EXPANDED ACCESS TO FINANCIAL SERVICES ACT OF 2005

1st Session 109 38 EXPANDED ACCESS TO FINANCIAL SERVICES ACT OF 2005 109TH CONGRESS REPORT " HOUSE OF REPRESENTATIVES! 1st Session 109 38 EXPANDED ACCESS TO FINANCIAL SERVICES ACT OF 2005 APRIL 12, 2005. Committed to the Committee of the Whole House on the State of the

More information

Public Law 113 274 113th Congress An Act

Public Law 113 274 113th Congress An Act 128 STAT. 2971 Public Law 113 274 113th Congress An Act To provide for an ongoing, voluntary public-private partnership to improve cybersecurity, and to strengthen cybersecurity research and development,

More information

1st Session 110 483 AUTHORIZING APPROPRIATIONS FOR THE SAN GABRIEL BASIN RESTORATION FUND

1st Session 110 483 AUTHORIZING APPROPRIATIONS FOR THE SAN GABRIEL BASIN RESTORATION FUND 110TH CONGRESS REPORT " HOUSE OF REPRESENTATIVES! 1st Session 110 483 AUTHORIZING APPROPRIATIONS FOR THE SAN GABRIEL BASIN RESTORATION FUND DECEMBER 11, 2007. Committed to the Committee of the Whole House

More information

Native American Language Preservation and Programs

Native American Language Preservation and Programs 113TH CONGRESS Calendar No. 541 REPORT " SENATE! 2d Session 113 266 AMENDING THE NATIVE AMERICAN PROGRAMS ACT OF 1974 TO PROVIDE FLEXIBILITY AND REAUTHORIZATION TO ENSURE THE SURVIVAL AND CONTINUING VITALITY

More information

2d Session 106 880 EXPORT WORKING CAPITAL LOAN IMPROVEMENT ACT OF 2000

2d Session 106 880 EXPORT WORKING CAPITAL LOAN IMPROVEMENT ACT OF 2000 106TH CONGRESS REPORT " HOUSE OF REPRESENTATIVES! 2d Session 106 880 EXPORT WORKING CAPITAL LOAN IMPROVEMENT ACT OF 2000 SEPTEMBER 21, 2000. Committed to the Committee of the Whole House on the State of

More information

1st Session 113 89 THE COMMERCIAL REAL ESTATE AND ECONOMIC DEVELOPMENT ACT OF 2013

1st Session 113 89 THE COMMERCIAL REAL ESTATE AND ECONOMIC DEVELOPMENT ACT OF 2013 113TH CONGRESS Calendar No. 167 REPORT " SENATE! 1st Session 113 89 THE COMMERCIAL REAL ESTATE AND ECONOMIC DEVELOPMENT ACT OF 2013 SEPTEMBER 10, 2013. Ordered to be printed Ms. LANDRIEU, from the Committee

More information

2d Session 109 424 RURAL HEALTH CARE CAPITAL ACCESS ACT OF 2006

2d Session 109 424 RURAL HEALTH CARE CAPITAL ACCESS ACT OF 2006 109TH CONGRESS REPORT " HOUSE OF REPRESENTATIVES! 2d Session 109 424 RURAL HEALTH CARE CAPITAL ACCESS ACT OF 2006 APRIL 25, 2006. Committed to the Committee of the Whole House on the State of the Union

More information

SECTION-BY-SECTION. Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012.

SECTION-BY-SECTION. Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012. SECTION-BY-SECTION Section 1. Short Title. The short title of the bill is the Cybersecurity Act of 2012. Section 2. Definitions. Section 2 defines terms including commercial information technology product,

More information

2d Session 112 591 TO REPEAL AN OBSOLETE PROVISION IN TITLE 49, UNITED STATES CODE, REQUIRING MOTOR VEHICLE INSURANCE COST REPORTING

2d Session 112 591 TO REPEAL AN OBSOLETE PROVISION IN TITLE 49, UNITED STATES CODE, REQUIRING MOTOR VEHICLE INSURANCE COST REPORTING 112TH CONGRESS REPORT " HOUSE OF REPRESENTATIVES! 2d Session 112 591 TO REPEAL AN OBSOLETE PROVISION IN TITLE 49, UNITED STATES CODE, REQUIRING MOTOR VEHICLE INSURANCE COST REPORTING JULY 10, 2012. Committed

More information

2d Session 112 633 RESPA HOME WARRANTY CLARIFICATION ACT OF 2012

2d Session 112 633 RESPA HOME WARRANTY CLARIFICATION ACT OF 2012 112TH CONGRESS REPORT " HOUSE OF REPRESENTATIVES! 2d Session 112 633 RESPA HOME WARRANTY CLARIFICATION ACT OF 2012 JULY 31, 2012. Committed to the Committee of the Whole House on the State of the Union

More information

2d Session 114 266 THE COMMERCIAL REAL ESTATE AND ECONOMIC DEVELOPMENT ACT OF 2015

2d Session 114 266 THE COMMERCIAL REAL ESTATE AND ECONOMIC DEVELOPMENT ACT OF 2015 114TH CONGRESS Calendar No. 107 REPORT " SENATE! 2d Session 114 266 THE COMMERCIAL REAL ESTATE AND ECONOMIC DEVELOPMENT ACT OF 2015 MAY 26, 2016. Ordered to be printed Mr. VITTER, from the Committee on

More information

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement

More information

2d Session 113 212 UNLOCKING CONSUMER CHOICE AND WIRELESS COMPETITION ACT. Mr. LEAHY, from the Committee on the Judiciary, submitted the following

2d Session 113 212 UNLOCKING CONSUMER CHOICE AND WIRELESS COMPETITION ACT. Mr. LEAHY, from the Committee on the Judiciary, submitted the following 113TH CONGRESS REPORT " SENATE! 2d Session 113 212 UNLOCKING CONSUMER CHOICE AND WIRELESS COMPETITION ACT JULY 17, 2014. Ordered to be printed Mr. LEAHY, from the Committee on the Judiciary, submitted

More information

H. R. 3878. To enhance cybersecurity information sharing and coordination at ports in the United States, and for other purposes.

H. R. 3878. To enhance cybersecurity information sharing and coordination at ports in the United States, and for other purposes. I TH CONGRESS 1ST SESSION H. R. To enhance cybersecurity information sharing and coordination at ports in the United States, and for other purposes. IN THE HOUSE OF REPRESENTATIVES NOVEMBER, 01 Mrs. TORRES

More information

S. 21 IN THE SENATE OF THE UNITED STATES

S. 21 IN THE SENATE OF THE UNITED STATES II 11TH CONGRESS 1ST SESSION S. 1 To secure the United States against cyber attack, to enhance American competitiveness and create jobs in the information technology industry, and to protect the identities

More information

Cyber Legislation & Policy Developments 2014

Cyber Legislation & Policy Developments 2014 Cyber Legislation & Policy Developments 2014 SESSION ID: LAW-Fo2 Michael A. Aisenberg, Esq. Chair, ABA Information Security Committee Policy Task Force ABA Section on Science & Technology Law Principal

More information

How To Write A National Cybersecurity Act

How To Write A National Cybersecurity Act ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses

More information

Cybersecurity and Corporate America: Finding Opportunities in the New Executive Order

Cybersecurity and Corporate America: Finding Opportunities in the New Executive Order Executive Order: In the President s State of the Union Address on February 12, 2013, he announced an Executive Order Improving Critical Infrastructure Cybersecurity (EO) to strengthen US cyber defenses

More information

1st Session 114 16. Mr. HATCH, from the Committee on Finance, submitted the following R E P O R T. [To accompany S. 905]

1st Session 114 16. Mr. HATCH, from the Committee on Finance, submitted the following R E P O R T. [To accompany S. 905] 114TH CONGRESS Calendar No. 39 REPORT " SENATE! 1st Session 114 16 A BILL TO AMEND THE INTERNAL REVENUE CODE OF 1986 TO INCREASE THE LIMITATION ON ELIGIBILITY FOR THE ALTERNATIVE TAX FOR CER- TAIN SMALL

More information

2d Session 109 489 TRUTH IN CALLER ID ACT OF 2006

2d Session 109 489 TRUTH IN CALLER ID ACT OF 2006 109TH CONGRESS REPORT " HOUSE OF REPRESENTATIVES! 2d Session 109 489 TRUTH IN CALLER ID ACT OF 2006 JUNE 6, 2006. Committed to the Committee of the Whole House on the State of the Union and ordered to

More information

September 28, 2 012 MEMORANDUM FOR. MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President

September 28, 2 012 MEMORANDUM FOR. MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President 004216 THE WHITE HOUSE WASHINGTON MEMORANDUM FOR September 28, 2 012 MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President MR. STEPHEN D. MULL Executive

More information

Public Law 113 283 113th Congress An Act

Public Law 113 283 113th Congress An Act PUBLIC LAW 113 283 DEC. 18, 2014 128 STAT. 3073 Public Law 113 283 113th Congress An Act To amend chapter 35 of title 44, United States Code, to provide for reform to Federal information security. Be it

More information

1st Session 114 30 MILITARY SPOUSE JOB CONTINUITY ACT OF 2015. Mr. HATCH, from the Committee on Finance, submitted the following R E P O R T

1st Session 114 30 MILITARY SPOUSE JOB CONTINUITY ACT OF 2015. Mr. HATCH, from the Committee on Finance, submitted the following R E P O R T 114TH CONGRESS Calendar No. 53 REPORT " SENATE! 1st Session 114 30 MILITARY SPOUSE JOB CONTINUITY ACT OF 2015 APRIL 14, 2015. Ordered to be printed 49 010 Mr. HATCH, from the Committee on Finance, submitted

More information

H.R. 2261 Small Business Loan Modification Program

H.R. 2261 Small Business Loan Modification Program CONGRESSIONAL BUDGET OFFICE COST ESTIMATE September 5, 1997 H.R. 2261 Small Business Programs Reauthorization and Amendments Acts of 1997 As ordered reported by the House Committee on Small Business on

More information

2d Session 110 831 DANIEL WEBSTER CONGRESSIONAL CLERKSHIP ACT OF 2008

2d Session 110 831 DANIEL WEBSTER CONGRESSIONAL CLERKSHIP ACT OF 2008 110TH CONGRESS REPORT " HOUSE OF REPRESENTATIVES! 2d Session 110 831 DANIEL WEBSTER CONGRESSIONAL CLERKSHIP ACT OF 2008 SEPTEMBER 8, 2008. Committed to the Committee of the Whole House on the State of

More information

1st Session 110 234 FDIC ENFORCEMENT ENHANCEMENT ACT

1st Session 110 234 FDIC ENFORCEMENT ENHANCEMENT ACT 110TH CONGRESS REPORT " HOUSE OF REPRESENTATIVES! 1st Session 110 234 FDIC ENFORCEMENT ENHANCEMENT ACT JULY 16, 2007. Committed to the Committee of the Whole House on the State of the Union and ordered

More information

One Hundred Thirteenth Congress of the United States of America

One Hundred Thirteenth Congress of the United States of America S. 1353 One Hundred Thirteenth Congress of the United States of America AT THE SECOND SESSION Begun and held at the City of Washington on Friday, the third day of January, two thousand and fourteen An

More information

2d Session 109 239 TRAIL OF TEARS NATIONAL HISTORIC TRAIL. Filed, under authority of the Senate of April 7, 2006

2d Session 109 239 TRAIL OF TEARS NATIONAL HISTORIC TRAIL. Filed, under authority of the Senate of April 7, 2006 109TH CONGRESS Calendar No. 401 REPORT " SENATE! 2d Session 109 239 TRAIL OF TEARS NATIONAL HISTORIC TRAIL APRIL 20, 2006. Ordered to be printed Filed, under authority of the Senate of April 7, 2006 Mr.

More information

WRITTEN TESTIMONY OF

WRITTEN TESTIMONY OF WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you

More information

2d Session 114 599 FEDERAL INFORMATION SYSTEMS SAFEGUARDS ACT OF 2016

2d Session 114 599 FEDERAL INFORMATION SYSTEMS SAFEGUARDS ACT OF 2016 114TH CONGRESS REPORT " HOUSE OF REPRESENTATIVES! 2d Session 114 599 FEDERAL INFORMATION SYSTEMS SAFEGUARDS ACT OF 2016 MAY 31, 2016. Committed to the Committee of the Whole House on the State of the Union

More information

One Hundred Thirteenth Congress of the United States of America

One Hundred Thirteenth Congress of the United States of America S. 2519 One Hundred Thirteenth Congress of the United States of America AT THE SECOND SESSION Begun held at the City of Washington on Friday, the third day of January, two thous fourteen An Act To codify

More information

2d Session 113 421 AMENDING THE NATIONAL LAW ENFORCEMENT MUSEUM ACT TO EXTEND THE TERMINATION DATE

2d Session 113 421 AMENDING THE NATIONAL LAW ENFORCEMENT MUSEUM ACT TO EXTEND THE TERMINATION DATE 113TH CONGRESS REPORT " HOUSE OF REPRESENTATIVES! 2d Session 113 421 AMENDING THE NATIONAL LAW ENFORCEMENT MUSEUM ACT TO EXTEND THE TERMINATION DATE APRIL 28, 2014. Committed to the Committee of the Whole

More information

S. 2519 AN ACT. To codify an existing operations center for cybersecurity.

S. 2519 AN ACT. To codify an existing operations center for cybersecurity. TH CONGRESS D SESSION S. 1 AN ACT To codify an existing operations center for cybersecurity. 1 Be it enacted by the Senate and House of Representa- tives of the United States of America in Congress assembled,

More information

1851 (d) RULE OF CONSTRUCTION. Nothing in this section shall be construed to (1) require a State to report data under subsection

1851 (d) RULE OF CONSTRUCTION. Nothing in this section shall be construed to (1) require a State to report data under subsection U:\REPT\OMNI\FinalOmni\CPRT--HPRT-RU00-SAHR-AMNT.xml 0 (d) RULE OF CONSTRUCTION. Nothing in this section shall be construed to () require a State to report data under subsection (a); or () require a non-federal

More information

TITLE I GENERAL PROVISIONS

TITLE I GENERAL PROVISIONS Public Law 101-576 November 15, 1990 Chief Financial Officers Act of 1990 One Hundred First Congress of the United States of America AT THE SECOND SESSION Begun and held at the City of Washington on Tuesday,

More information

Presidential Documents

Presidential Documents Federal Register Vol. 58, No. 190 Presidential Documents Monday, October 4, 1993 Title 3 The President Executive Order 12866 of September 30, 1993 Regulatory Planning and Review The American people deserve

More information

H. R. ll IN THE HOUSE OF REPRESENTATIVES A BILL

H. R. ll IN THE HOUSE OF REPRESENTATIVES A BILL F:\M\BARLET\BARLET_0.XML TH CONGRESS ST SESSION... (Original Signature of Member) H. R. ll To amend the Homeland Security Act of 00 to enhance the partnership between the Department of Homeland Security

More information

Public Law 108 330 108th Congress An Act

Public Law 108 330 108th Congress An Act PUBLIC LAW 108 330 OCT. 16, 2004 118 STAT. 1275 Public Law 108 330 108th Congress An Act To amend title 31, United States Code, to improve the financial accountability requirements applicable to the Department

More information

1st Session 112 282 ALTO LEE ADAMS, SR., UNITED STATES COURTHOUSE

1st Session 112 282 ALTO LEE ADAMS, SR., UNITED STATES COURTHOUSE 112TH CONGRESS REPORT " HOUSE OF REPRESENTATIVES! 1st Session 112 282 ALTO LEE ADAMS, SR., UNITED STATES COURTHOUSE NOVEMBER 14, 2011. Referred to the House Calendar and ordered to be printed 19 006 Mr.

More information

1st Session 114 22 A BILL TO AMEND THE INTERNAL REVENUE CODE TO EXCLUDE AMOUNTS RECEIVED UNDER WORK-LEARNING SERVICE PROGRAMS

1st Session 114 22 A BILL TO AMEND THE INTERNAL REVENUE CODE TO EXCLUDE AMOUNTS RECEIVED UNDER WORK-LEARNING SERVICE PROGRAMS 114TH CONGRESS Calendar No. 45 REPORT " SENATE! 1st Session 114 22 A BILL TO AMEND THE INTERNAL REVENUE CODE TO EXCLUDE AMOUNTS RECEIVED UNDER WORK-LEARNING SERVICE PROGRAMS APRIL 14, 2015. Ordered to

More information

Public Law 111 264 111th Congress An Act

Public Law 111 264 111th Congress An Act PUBLIC LAW 111 264 OCT. 8, 2010 124 STAT. 2789 Public Law 111 264 111th Congress An Act To amend the Stem Cell Therapeutic and Research Act of 2005. Be it enacted by the Senate and House of Representatives

More information

Housing Bill Introduced to State Committee

Housing Bill Introduced to State Committee 110TH CONGRESS REPORT " HOUSE OF REPRESENTATIVES! 2nd Session 110 521 PUBLIC HOUSING ASSET MANAGEMENT IMPROVEMENT ACT OF 2007 JANUARY 29, 2008. Committed to the Committee of the Whole House on the State

More information

Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist July 11, 2013 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research

More information

How To Protect Yourself From Cyber Crime

How To Protect Yourself From Cyber Crime Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist October 25, 2013 Congressional Research Service 7-5700 www.crs.gov R42507 c11173008 Cybersecurity: Authoritative

More information

VETERANS CLAIMS ASSISTANCE ACT OF 2000

VETERANS CLAIMS ASSISTANCE ACT OF 2000 PUBLIC LAW 106 475 NOV. 9, 2000 VETERANS CLAIMS ASSISTANCE ACT OF 2000 VerDate 11-MAY-2000 06:07 Dec 06, 2000 Jkt 089139 PO 00475 Frm 00001 Fmt 6579 Sfmt 6579 E:\PUBLAW\PUBL475.106 APPS27 PsN: PUBL475

More information

2d Session 111 232 PUBLIC TRANSPORTATION SAFETY ACT OF 2010

2d Session 111 232 PUBLIC TRANSPORTATION SAFETY ACT OF 2010 111TH CONGRESS Calendar No. 480 REPORT " SENATE! 2d Session 111 232 PUBLIC TRANSPORTATION SAFETY ACT OF 2010 JULY 26, 2010. Ordered to be printed Mr. DODD, from the Committee on Banking, Housing and Urban

More information

S. 534 National Association of Registered Agents and Brokers Reform Act of 2013

S. 534 National Association of Registered Agents and Brokers Reform Act of 2013 CONGRESSIONAL BUDGET OFFICE COST ESTIMATE June 13, 2013 S. 534 National Association of Registered Agents and Brokers Reform Act of 2013 As ordered reported by the Senate Committee on Banking, Housing,

More information

1st Session 114 83 NATIONAL CYBERSECURITY PROTECTION ADVANCEMENT ACT OF 2015

1st Session 114 83 NATIONAL CYBERSECURITY PROTECTION ADVANCEMENT ACT OF 2015 114TH CONGRESS REPORT " HOUSE OF REPRESENTATIVES! 1st Session 114 83 NATIONAL CYBERSECURITY PROTECTION ADVANCEMENT ACT OF 2015 APRIL 17, 2015. Committed to the Committee of the Whole House on the State

More information

Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist July 18, 2013 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research

More information

1st Session Part 1 FEDERAL EMPLOYEE TAX ACCOUNTABILITY ACT OF 2013

1st Session Part 1 FEDERAL EMPLOYEE TAX ACCOUNTABILITY ACT OF 2013 113TH CONGRESS REPT. 113 38 " HOUSE OF REPRESENTATIVES! 1st Session Part 1 FEDERAL EMPLOYEE TAX ACCOUNTABILITY ACT OF 2013 APRIL 12, 2013. Committed to the Committee of the Whole House on the State of

More information

The Dow Chemical Company. statement for the record. David E. Kepler. before

The Dow Chemical Company. statement for the record. David E. Kepler. before The Dow Chemical Company statement for the record of David E. Kepler Chief Sustainability Officer, Chief Information Officer, Business Services and Executive Vice President before The Senate Committee

More information

Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist April 17, 2013 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research

More information

S. 1353 AN ACT. Be it enacted by the Senate and House of Representa- tives of the United States of America in Congress assembled,

S. 1353 AN ACT. Be it enacted by the Senate and House of Representa- tives of the United States of America in Congress assembled, TH CONGRESS D SESSION S. AN ACT To provide for an ongoing, voluntary public-private partnership to improve cybersecurity, and to strengthen cybersecurity research and development, workforce development

More information

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Cybersecurity: Legislation, Hearings, and Executive Branch Documents Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan, Information Research Specialist (rtehan@crs.loc.gov, 7-6739) April 17, (R43317) Summary Cybersecurity vulnerabilities challenge

More information

Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council

Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council Presented by Doug Copley, Chairman Michigan Healthcare Cybersecurity Council Mr. Chairman and Committee Members,

More information

Written Statement of Richard Dewey Executive Vice President New York Independent System Operator

Written Statement of Richard Dewey Executive Vice President New York Independent System Operator Written Statement of Richard Dewey Executive Vice President New York Independent System Operator Senate Standing Committee on Veterans, Homeland Security and Military Affairs Senator Thomas D. Croci, Chairman

More information

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Cybersecurity: Legislation, Hearings, and Executive Branch Documents CRS Reports & Analysis Print Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan, Information Research Specialist (rtehan@crs.loc.gov, 7-6739) View Key CRS Policy Staff May

More information

Cybersecurity Primer

Cybersecurity Primer Cybersecurity Primer August 15, 2014 National Journal Presentation Credits Producer: David Stauffer Director: Jessica Guzik Cybersecurity: Key Terms Cybersecurity Information security applied to computers

More information

TITLE I NURSE RECRUITMENT

TITLE I NURSE RECRUITMENT 116 STAT. 811 Public Law 107 205 107th Congress An Act To amend the Public Health Service Act with respect to health professions programs regarding the field of nursing. Be it enacted by the Senate and

More information

1st Session 114 27 LNG AND LPG EXCISE TAX EQUALIZATION ACT OF 2015. Mr. HATCH, from the Committee on Finance, submitted the following R E P O R T

1st Session 114 27 LNG AND LPG EXCISE TAX EQUALIZATION ACT OF 2015. Mr. HATCH, from the Committee on Finance, submitted the following R E P O R T 114TH CONGRESS Calendar No. 50 REPORT " SENATE! 1st Session 114 27 LNG AND LPG EXCISE TAX EQUALIZATION ACT OF 2015 APRIL 14, 2015. Ordered to be printed Mr. HATCH, from the Committee on Finance, submitted

More information

1st Session 114 61. APRIL 13, 2015. Committed to the Committee of the Whole House on the State of the Union and ordered to be printed

1st Session 114 61. APRIL 13, 2015. Committed to the Committee of the Whole House on the State of the Union and ordered to be printed 114TH CONGRESS REPORT " HOUSE OF REPRESENTATIVES! 1st Session 114 61 TO AMEND THE EXPEDITED FUNDS AVAILABILITY ACT TO CLARIFY THE APPLICATION OF THAT ACT TO AMERICAN SAMOA AND THE NORTHERN MARIANA ISLANDS

More information

Department of Transportation

Department of Transportation Tuesday, November 7, 2006 Part V Department of Transportation Federal Transit Administration Fiscal Year 2007 Annual List of Certifications and Assurances for Federal Transit Administration Grants and

More information

Cybersecurity: Legislation, Hearings, and Executive Branch Documents

Cybersecurity: Legislation, Hearings, and Executive Branch Documents Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan Information Research Specialist November 17, 2015 Congressional Research Service 7-5700 www.crs.gov R43317 Cybersecurity:

More information

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be

More information

Public Law 107 305 107th Congress An Act

Public Law 107 305 107th Congress An Act PUBLIC LAW 107 305 NOV. 27, 2002 116 STAT. 2367 Public Law 107 305 107th Congress An Act To authorize funding for computer and network security research and development and research fellowship programs,

More information

H.R. 6658. Disaster Response, Recovery, and Mitigation Enhancement Act of 2008

H.R. 6658. Disaster Response, Recovery, and Mitigation Enhancement Act of 2008 CONGRESSIONAL BUDGET OFFICE COST ESTIMATE October 7, 2008 H.R. 6658 Disaster Response, Recovery, and Mitigation Enhancement Act of 2008 As ordered reported by the House Committee on Transportation and

More information

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security. Written Testimony of Dr. Andy Ozment Assistant Secretary for Cybersecurity and Communications U.S. Department of Homeland Security Before the U.S. House of Representatives Committee on Oversight and Government

More information

Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist September 20, 2013 Congressional Research Service 7-5700 www.crs.gov R42507 Cybersecurity: Authoritative Reports

More information

Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist October 25, 2013 Congressional Research Service 7-5700 www.crs.gov R42507 Report Documentation Page Form Approved

More information

How To Codify A Cybersecurity Operations Center

How To Codify A Cybersecurity Operations Center II 11TH CONGRESS D SESSION S. 19 To codify an existing operations center for cybersecurity. IN THE SENATE OF THE UNITED STATES JUNE, 01 Mr. CARPER (for himself and Mr. COBURN) introduced the following

More information

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement

GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,

More information

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS NEW YORK Jeremy Feigelson jfeigelson@debevoise.com WASHINGTON, D.C. Satish M. Kini smkini@debevoise.com Renee

More information

Implementation of the Cybersecurity Executive Order

Implementation of the Cybersecurity Executive Order Implementation of the Cybersecurity Executive Order November 13 th, 2013 Ben Beeson, Partner, Lockton Companies Gerald J. Ferguson, Partner, BakerHostetler Mark Weatherford, Principal, The Chertoff Group

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

TITLE VI NATIONAL EMERGENCY MANAGEMENT

TITLE VI NATIONAL EMERGENCY MANAGEMENT 120 STAT. 1394 PUBLIC LAW 109 295 OCT. 4, 2006 Training, there is appropriated an additional $2,500,000, to remain available until expended for National Special Security Events. SEC. 560. Transfer authority

More information

Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist August 16, 2013 Congressional Research Service 7-5700 www.crs.gov R42507 Cybersecurity: Authoritative Reports

More information

INSPECTOR GENERAL DEPARTMENT OF DEFENSE 4800 MARK CENTER DRIVE ALEXANDRIA, VIRGINIA 22350-1500

INSPECTOR GENERAL DEPARTMENT OF DEFENSE 4800 MARK CENTER DRIVE ALEXANDRIA, VIRGINIA 22350-1500 INSPECTOR GENERAL DEPARTMENT OF DEFENSE 4800 MARK CENTER DRIVE ALEXANDRIA, VIRGINIA 22350-1500 MAY 2 8 2014 MEMORANDUM FOR DISTRIBUTION SUBJECT: Government Accountability Office (GAO) Weekly Activity Repati

More information

S. ll IN THE SENATE OF THE UNITED STATES

S. ll IN THE SENATE OF THE UNITED STATES OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American

More information

Cybersecurity: Authoritative Reports and Resources

Cybersecurity: Authoritative Reports and Resources Cybersecurity: Authoritative Reports and Resources Rita Tehan Information Research Specialist December 26, 2012 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research

More information

S. 611. [Report No. 114 346] IN THE HOUSE OF REPRESENTATIVES. JUNE 10, 2015 Referred to the Committee on Energy and Commerce

S. 611. [Report No. 114 346] IN THE HOUSE OF REPRESENTATIVES. JUNE 10, 2015 Referred to the Committee on Energy and Commerce ID 114TH CONGRESS 1ST SESSION S. 611 Union Calendar No. 264 [Report No. 114 346] IN THE HOUSE OF REPRESENTATIVES JUNE 10, 2015 Referred to the Committee on Energy and Commerce NOVEMBER 19, 2015 Committed

More information

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities. GAO United States General Accounting Office Testimony Before the Subcommittee on Technology, Terrorism and Government Information, Committee on the Judiciary, U.S. Senate For Release on Delivery Expected

More information

Business Continuity for Cyber Threat

Business Continuity for Cyber Threat Business Continuity for Cyber Threat April 1, 2014 Workshop Session #3 3:00 5:30 PM Susan Rogers, MBCP, MBCI Cyberwise CP S2 What happens when a computer program can activate physical machinery? Between

More information

F:\COMP\SCIENCE\CYBER SECURITY RESEARCH AND DEVELOPMENT ACT.XML

F:\COMP\SCIENCE\CYBER SECURITY RESEARCH AND DEVELOPMENT ACT.XML [ UPDATE COMP VERSION: This file reflects the execution of the amendments made by PL 113-283. Note that this version has been designed for review purposes just prior to publishing and replacing the source

More information